<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Office Excel — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/office-excel/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 12 May 2026 18:35:04 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/office-excel/feed.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2026-40362: Microsoft Excel Heap-based Buffer Overflow Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-cve-2026-40362/</link><pubDate>Tue, 12 May 2026 18:35:04 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cve-2026-40362/</guid><description>A heap-based buffer overflow vulnerability, identified as CVE-2026-40362, exists in Microsoft Office Excel, allowing an unauthenticated attacker with local access to execute arbitrary code.</description><content:encoded><![CDATA[<p>CVE-2026-40362 is a heap-based buffer overflow vulnerability affecting Microsoft Office Excel. This vulnerability allows an attacker with local access to execute arbitrary code. An unauthenticated attacker could exploit this vulnerability by crafting a malicious Excel file. User interaction is required, as the user must open the specially crafted file. Successful exploitation could lead to arbitrary code execution in the context of the current user. Defenders should prioritize patching this vulnerability to prevent potential exploitation.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious Excel file (.xls or .xlsx) designed to trigger the heap-based buffer overflow.</li>
<li>The attacker delivers the malicious file to the target user. This could be via a shared network drive, removable media, or social engineering.</li>
<li>The target user opens the malicious Excel file with Microsoft Office Excel.</li>
<li>Excel parses the malicious file, triggering the heap-based buffer overflow when processing a specific data structure within the file.</li>
<li>The overflow allows the attacker to overwrite adjacent memory regions on the heap, potentially gaining control of program execution.</li>
<li>The attacker leverages the memory corruption to inject and execute malicious code within the Excel process.</li>
<li>The attacker&rsquo;s code executes with the privileges of the user who opened the file, allowing for local code execution.</li>
<li>The attacker performs malicious actions such as installing malware, exfiltrating data, or further compromising the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-40362 allows an attacker to execute arbitrary code on the victim&rsquo;s machine. Due to the local nature of the attack, the impact is limited to the compromised system. An attacker can leverage this vulnerability to gain a foothold on the system, potentially leading to data theft, malware installation, or further lateral movement within the network, depending on the user&rsquo;s privileges.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security update provided by Microsoft to patch CVE-2026-40362 in Microsoft Office Excel.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious Excel File Execution&rdquo; to identify potential exploitation attempts based on process creation events.</li>
<li>Educate users about the risks of opening untrusted or unsolicited Excel files.</li>
<li>Monitor process execution for unusual or unexpected child processes spawned by Excel, as detected by &ldquo;Detect Suspicious Excel Spawning&rdquo;.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve</category><category>heap-based buffer overflow</category><category>excel</category><category>code execution</category><category>windows</category></item><item><title>CVE-2026-40360: Microsoft Excel Out-of-Bounds Read Information Disclosure</title><link>https://feed.craftedsignal.io/briefs/2026-05-cve-2026-40360-excel-oob-read/</link><pubDate>Tue, 12 May 2026 18:34:32 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cve-2026-40360-excel-oob-read/</guid><description>CVE-2026-40360 is an out-of-bounds read vulnerability in Microsoft Office Excel that allows an unauthorized attacker to disclose sensitive information locally.</description><content:encoded><![CDATA[<p>CVE-2026-40360 is a security vulnerability affecting Microsoft Office Excel. This out-of-bounds read vulnerability allows an unauthorized attacker to potentially disclose sensitive information locally. Exploitation of this vulnerability requires local access and user interaction as a prerequisite. This vulnerability was reported to Microsoft and assigned a CVSS base score of 7.8, indicating a high severity level. Successful exploitation results in information disclosure, though the scope of disclosure and potential impact on confidentiality is not detailed in the advisory.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts a malicious Excel file containing specific data structures designed to trigger the out-of-bounds read condition.</li>
<li>The attacker delivers the crafted Excel file to the victim through social engineering.</li>
<li>The victim opens the malicious Excel file using a vulnerable version of Microsoft Office Excel.</li>
<li>Excel attempts to read data from a memory location outside the intended buffer due to the crafted file.</li>
<li>The out-of-bounds read occurs, potentially disclosing sensitive data from adjacent memory regions.</li>
<li>The disclosed data is then accessible to the attacker, who can analyze it for sensitive information.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-40360 allows an attacker to disclose information locally. The CVSS score of 7.8 suggests that, while local access and user interaction are required, the potential impact on confidentiality is high. The advisory does not specify the type or amount of information that can be disclosed or the number of potential victims, but the impact could include exposure of sensitive data within the Excel file or from other memory locations accessible to the Excel process.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security update released by Microsoft to address CVE-2026-40360 as referenced in the advisory URL.</li>
<li>Deploy the Sigma rule &ldquo;Detect Excel Out-of-Bounds Read via Formula&rdquo; to identify potential exploitation attempts based on formula patterns in Excel files.</li>
<li>Enable process creation logging to monitor for suspicious Excel processes as detected by the &ldquo;Detect Suspicious Excel Process Creation&rdquo; Sigma rule.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cve</category><category>information-disclosure</category><category>excel</category></item><item><title>CVE-2026-40359: Microsoft Excel Use-After-Free Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-cve-2026-40359-excel-uaf/</link><pubDate>Tue, 12 May 2026 18:34:19 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cve-2026-40359-excel-uaf/</guid><description>CVE-2026-40359 is a use-after-free vulnerability in Microsoft Office Excel that allows a local attacker to execute arbitrary code by exploiting memory corruption.</description><content:encoded><![CDATA[<p>CVE-2026-40359 is a use-after-free (UAF) vulnerability affecting Microsoft Office Excel. This vulnerability allows an unauthorized, local attacker to execute arbitrary code. The vulnerability exists due to improper handling of memory objects within Excel, leading to a situation where freed memory is accessed again. Successful exploitation allows the attacker to gain control over the affected system. This vulnerability was published on May 12, 2026, and poses a significant risk to systems running vulnerable versions of Microsoft Excel. An attacker could potentially leverage this vulnerability to install malware, steal sensitive data, or perform other malicious activities.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts a malicious Excel file designed to trigger the use-after-free condition.</li>
<li>The victim opens the specially crafted Excel file.</li>
<li>Excel attempts to access a memory location that has already been freed.</li>
<li>The use-after-free condition leads to memory corruption.</li>
<li>The attacker leverages the memory corruption to overwrite critical data structures within the Excel process.</li>
<li>The attacker gains control of the program counter by overwriting a function pointer or similar mechanism.</li>
<li>The attacker redirects execution flow to attacker-controlled code.</li>
<li>The attacker executes arbitrary code within the context of the Excel process, potentially gaining local code execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-40359 allows an attacker to execute arbitrary code locally on a targeted system. Given the ubiquitous use of Microsoft Excel in various sectors, a successful exploit can lead to significant damage, including data theft, malware installation, and potential system compromise. The CVSS v3.1 base score of 7.8 reflects the high potential impact, especially considering the ease of local exploitation if a user opens a malicious Excel file.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security update provided by Microsoft to patch CVE-2026-40359 in Microsoft Office Excel as soon as possible, as referenced in the provided URL.</li>
<li>Deploy the Sigma rule <code>Detect Excel Use-After-Free via Suspicious Process Creation</code> to identify potential exploitation attempts based on unusual processes spawned by Excel.</li>
<li>Enable process creation logging to capture events necessary for the Sigma rule.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>use-after-free</category><category>code execution</category><category>excel</category></item></channel></rss>